Introduction to Technical Seminar Presentation on Resource Allocation and Security:

The system which works on autonomous cups so as to make complete system works as a single computer. They usually interact with external world that may consume time; they are of two type soft and hard real time systems. They are used for migration and data process. They are also used because they have better communication, speed and very much reliable and can be used for sharing also.

Event vs. trigger time: trigger systems are based on interrupt given,it gives faster response at low load and it may fails during high load. They are suitable for static environment.

Dynamic scheduling is better for the use of resources. They decide their scheduling during execution which task to run. Dynamic time system consists of time servers. They are mutually consistent.

DTS time model: they record all time atregular intervals. That runs on client machine and the clock in synchronization with the other systems clocks.

ACL: they guide the user who can use resource and how, that are managed by the managers. ACL decided by seeing client PACs on based of their groups.

Security: this is the main principle for user that they require security about their communication. Authentication process is used so that only authorized used can use this service. They are based on the model of cryptography. Systems must have suitable firewalls. In this message was encrypted in algorithm form and at the server it is decrypted to original text with help of key. Database is secured using registry servers, which contains all the groups and organizations. Login facility is also used by servers and clients to do its work.

Authenticated RPS: they are used to establish secure connection. After authentication now it depend upon user how security they require.